Hi [[ session.user.profile.firstName ]]

Phishing Awareness and Response: Can Technology Alone Make a Difference?

Phishing has been well established as the top entry method for hackers trying to access corporate networks. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.
That technology- those investments are failing while organizations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence.
In this presentation, PhishMe’s COO, Jim Hansen, will draw on his 25 years in law enforcement and IT security to discuss:
•The current state of phishing
•The success and failure of technology systems and how human systems can protect the last mile
•How conditioning – not training - activates employees to identify and report phishing attacks
•The critical attack intelligence generated from employees and how it can be used to detect attacks-in progress and aid phishing incident response

Join PhishMe and (ISC)² on Sept 21 (Wed) at 2:00p.m. (Singapore time) for a security briefing on phishing awareness and response.

Presenter: Jim Hansen, Chief Operating Officer, PhishMe
Bios:
Jim has over twenty-two years’ experience in sales, operations and
executive management in the information security industry,
including co-founding and serving as COO of Mandiant. He has also
held numerous executive and management positions in both sales
and consulting organizations, and regularly speaks and publishes
articles on information security topics.
Recorded Sep 21 2016 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jim Hansen, Chief Operating Officer, PhishMe
Presentation preview: Phishing Awareness and Response: Can Technology Alone Make a Difference?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 悪質なボットへの適切な対策とは Jun 19 2019 8:00 am UTC 60 mins
    Yukio Ito, CISSP, Solution Architect, F5 Networks
    悪意のあるボットを識別し、それらから防御することは、持続可能なセキュリティ戦略を策定する組織にとって最優先事項です。

    このウェビナーでは以下のことを学ぶことができます:
    • ボットはどのようにしてアプリケーションに感染、伝播、攻撃するのか
    • ボットによって実行されるアプリケーション攻撃の種類
    • 有益なボットを破壊することなく、悪意のあるボットを防御する手法

    Presenter: Yukio Ito, CISSP, Solution Architect, F5 Networks
    Moderator: 小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • アプリのアクセスを制御!クラウドベースの「ID認識型プロキシ」の仕組み May 22 2019 7:00 am UTC 60 mins
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    前回は、組織内外を防御するセキュリティプランを策定する際の、アイデンティティの重要性について取り上げました。いただいたリクエストをもとに、今回のウェビナーでは、次のトピックについて技術面からさらに詳しく解説します。

    • クレジットカード情報を盗む Magecart などの悪意のある JavaScript スキマーコードから、公開されているアプリケーションを保護する方法。攻撃者が使用する一般的なベクトルと、組織がウェブサイトや顧客を保護する方法について解説します。

    • 企業のクラウドセキュリティを強化し、アタックサーフェス(攻撃の対象となり得る領域)を減らして、被害の可能性を最小限にする方法。以前のウェビナーでも扱ったID認識型プロキシについてさらに深く掘り下げて、その仕組みをセキュリティ対策強化に役立てる方法を解説します。

    Presenter: 中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies
    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator: 小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Defining Security Posture in a Zero Trust World May 22 2019 5:00 am UTC 60 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Johnny Yeo, Senior Enterprise Security Architect, Akamai
    It is generally agreed that there are three key pillars of a zero trust approach - Access, Identity and Posture. In previous webinars we have explored how an identity driven approach can be used with a cloud proxy to better secure access to internal applications. In the first part of this webinar we will dive deeper into the third pillar – posture- understand what it means to a user and their devices and see how it can be integrated into a zero trust architecture. The second part will look at the mitigation aspect of posture. We’ll cover the API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Johnny Yeo, Senior Enterprise Security Architect, Akamai Technologies
  • Beyond Shadow IT: How Leading Organisations Protect Sensitive Cloud Data Recorded: Apr 17 2019 62 mins
    Richard Campagna, CMO & VP of Products, Bitglass; Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

    In this webinar, we'll explore:
    • Critical gaps in cloud applications that must be filled
    • Four sets of capabilities required for cybersecurity in the cloud
    • How CASBs provide specialized security that goes beyond native cloud app functionality like that of Office 365
    • Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

    Join Bitglass and (ISC)² on Apr 17, 2019 (Wed) at 11:00 (GMT +8) to learn how a CASB can help you meet your security and compliance requirements.

    Presenter: Richard Campagna, CMO & VP of Products, Bitglass
    Presenter: Brendon Thwaites, Director, Channels & Alliances APJ, Bitglass
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • DevSecOps – Web Application Firewall in a CI/CD Workflow (以粵語進行) Recorded: Apr 10 2019 61 mins
    Clive Chan, Senior Consultant, F5 Networks
    IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.

    In this webinar, we will look at the changing landscape of DevOps. We will explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.

    Join F5 Networks and (ISC)² on Apr 10, 2019 (Wed) at 15:00 (Hong Kong time) to learn about web application firewall in a CI/CD workflow.

    Presenter: Clive Chan, Senior Consultant, F5 Networks
    Moderator: Otto Lee, CISSP, CSSLP, Membership Chair, (ISC)² Hong Kong Chapter

    *This webinar will be conducted in Cantonese. (本次網上研討會將以粵語進行。)
  • (ISC)² Info Session: Get to know the CISSP Concentrations (ISSAP/ISSEP/ISSMP) Recorded: Apr 9 2019 62 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Go beyond the CISSP and challenge yourself with a CISSP Concentration! Challenge yourself with a CISSP Concentration! These specialized credentials build upon the CISSP. Whether you’re interested in career growth, deeper knowledge or achieving elite status, CISSP Concentrations prove your subject matter mastery.

    Got questions on the certifications? We have the answers.

    In this info-session, you will learn:

    - How large is the cybersecurity workforce gap today
    - Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Are you ready to prove yourself? Register and begin your journey today!

    NOTE: This info-session is meant for CISSP credential holders only. Join this info-session and earn 1 CPE.
    ________________________________________________________________________

    CISSP Concentrations:

    • Information Systems Security Architecture Professional (ISSAP)
    This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

    • Information Systems Security Engineering Professional (ISSEP)
    This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

    • Information Systems Security Management Professional (ISSMP)
    This certification shows you excel at establishing, presenting and governing information security programs. You also demonstrate deep management and leadership skills whether you’re leading incident handling and/or a breach mitigation team.
  • Fight the Good Fight Against the Bad Bots Recorded: Apr 3 2019 61 mins
    Shahnawaz Backer, Security Specialist, APAC, F5 Networks
    Identifying malicious bots and safeguarding against them is a top priority for organisations developing a sustainable security strategy.

    Attend this webinar to learn:
    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones

    Join F5 Networks and (ISC)² on Apr 3, 2019 (Wed) at 14:00 (GMT +8) to learn how to fight against the malicious bots.

    Presenter: Shahnawaz Backer, Security Specialist, APAC, F5 Networks
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • 사용자 ID 기반의 보안 방식 Recorded: Mar 27 2019 63 mins
    한 준 형, Technical Account Manager, TSG-KR Media, Akamai Technologies; 김 현 도, Senior Solution Engineer, Akamai Technologies
    사용자 ID는 보안 및 생산성과 관련되어 있는 기업 보안의 핵심 요소입니다. 이 웨비나에서는 기업을 내부 및 외부적으로 보호하려면 ID를 어떻게 관리해야 하는지에 대해 중점적으로 다룰 예정입니다.

    • 이전에는 제로 트러스트 아키텍처의 개념에 대해 살펴봤습니다. 제로 트러스트 네트워크를 구축하는 많은 방법 중의 하나는 바로 IAP(Identity Aware Proxy)입니다. 웨비나의 전반부에는 네트워크가 아닌 애플리케이션 레이어에서 ID와 접속 룰을 적용하고 최소 접속 권한을 제공하는 IAP의 모범 사례에 대해 중점적으로 알아봅니다.

    • 후반부에는 아시아∙태평양∙일본 지역에서 증가하고 있는 크리덴셜 스터핑 활동에 대해 설명합니다. 크리덴셜 스터핑의 근본 원인, 경제적 손실, 공격자들이 사용하는 방법, 봇넷을 통한 자동화에 대해 중점적으로 살펴봅니다. 또한 봇넷 리스크를 성공적으로 차단하기 위해 여러 분야의 기업들이 도입한 솔루션에 대해 소개하는 사례 연구도 언급할 예정입니다.

    발표자: 한 준 형, Technical Account Manager, TSG-KR Media, Akamai Technologies
    발표자: 김 현 도, Senior Solution Engineer, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • IDを使用して組織の内と外を防御する Recorded: Mar 20 2019 62 mins
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies
    ID は、セキュリティと生産性を両立するようなセキュリティプランを立てるための重要な要素です。このウェビナーでは、ID 管理による組織内外の防御について考察します。

    • ゼロトラスト・アーキテクチャの考え方についてはすでに取り上げてきましたが、ゼロトラスト・ネットワークを設計する際に利用できるオプションはたくさんあります。その 1 つが Identity Aware Proxy(IAP)です。 このウェビナーの前半では、IAP を実装する際のベストプラクティスを説明します。IAP を使用することで、ネットワークレイヤーではなくアプリケーションレイヤーで ID とアクセスルールを適用し、必要最小限のアクセス権の原則に基づいて確実にアクセスを制御します。

    • 後半では、アジア太平洋および日本における Credential Stuffing (ボットによる不正ログイン)犯罪の増加について取り上げます。このセッションでは、Credential Stuffing が生じる原因、攻撃による経済的損失、攻撃者が利用する手法、ボットによる自動化などについて解説します。また、ボットがもたらすリスクの緩和について、さまざまな業界での成功事例も紹介します。

    Presenter: 中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies
    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator:小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Best Practices in Securing DNS Recorded: Mar 20 2019 63 mins
    Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
    NGFWs, IDS, sandboxes, DLP, etc are important - but increasingly, DNS is a major security weakness, allowing hackers to exfiltrate & infiltrate confidential data. This is a known issue because DNS was initially designed very simple and this attracts hackers to abuse the protocol. How do we protect our internal data and prevent hacker attacking the service?

    Join Infoblox and (ISC)² on Mar 20, 2019 (Wed) at 14:00 (GMT +8) to learn the best practices in securing DNS.

    Presenter: Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • 避开2019年的安全威胁和物联网IoT的安全案例分析 Recorded: Mar 13 2019 63 mins
    郑伟, 大中华区产品市场部经理, Akamai Technologies; 陈家俊, CISSP, 高级安全系统架构师, Akamai Technologies
    当大家都在为已到来的2019年开始制定重要的安全规划时, 我们会回顾过去的2018年安全大事件以确保我们不会错过任何安全盲点。此外,该研讨会也会分享最新的物联网IoT(Internet of Things) 僵尸网络驱动的DDoS攻击,最真实的安全事件和最佳实践。

    您将了解到:
    • 分析安全行业的发展趋势以及这些趋势在未来一年可能会从哪些方面对我们产生影响?
    • 当您怀疑自己受到DDoS攻击时,该如何分析以及与您的安全厂商进行有效的沟通?
    • 我们如何面对物联网IoT DDoS攻击和如何实施防范措施?

    参加Akamai Technologies和 (ISC)² 在3月13日下午2:00至3:00的在线研讨会,聆听专家分析如何避开2019年的安全威胁和物联网IoT的安全案例分析,还等什么?赶紧加入我们吧。

    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    演讲人: 陈家俊, CISSP, 高级安全系统架构师, Akamai Technologies
    主持人: 卢佐华, CISSP-ISSAP, (ISC)² 北京分会主席

    *本次在线研讨会将以普通话进行
  • (ISC)² Info Session: CCSP - The Industry’s Premier Cloud Security Certification Recorded: Mar 12 2019 64 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/ccsp

    Are you ready to prove yourself? Register and begin your CCSP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Cybersecurity Predictions 2019 and Advanced Technology on Endpoint Protection Recorded: Mar 6 2019 61 mins
    Wayne Lam, Solutions Systems Engineer, Symantec
    Cyber hacks of major corporate systems and websites continued apace and will inevitably be part of the 2019 cybersecurity scene. Many well-known organizations across the globe suffered significant breaches. Beyond all-too-common corporate attacks, 2018 was also marked by accelerated threat activity across a diverse range of targets and victims.

    Staying ahead of the evolving threat landscape requires an easy to implement endpoint security framework and simplified, yet powerful, security tools to protect against emerging threats. New techniques have vastly improved response to evolving attacks. Advanced Endpoint Security explains how these technologies work and sets forth an integrated framework for endpoint security that covers it all.

    Join Symantec and (ISC)² on Mar 6, 2019 (Wed) at 15:00 (Hong Kong time) to explore the cybersecurity predictions and advanced technology on endpoint protection.

    Presenter: Wayne Lam, Solutions Systems Engineer, Symantec
    Moderator: SC Leung, CISSP, CCSP, Member, Asia-Pacific Advisory Council, (ISC)²

    *This webinar will be conducted in Cantonese.
  • Access Denied! Decoding Identity Aware Proxies Recorded: Mar 6 2019 63 mins
    Nick Hawkins, Senior Director, Product Management, Enterprise; Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai
    Previously, we covered how identity is a key factor in a security plan when protecting your organization internally and externally. We heard your requests and hence, this upcoming webinar will be a deeper technical discussion on how to:

    • Protect your public-facing applications against malicious Javascript skimmer code such as Magecart credit card stealer. We’ll outline the common vectors used by such attackers and how organizations can protect their websites and customers.

    • Enhance your enterprise security perimeter and reduce your attack surface, minimizing the chance of an attack. Picking up from our previous webinar, we’ll do a deep dive on Identity Aware Proxies and examine how their architecture helps improve your security posture.

    Join Akamai Technologies and (ISC)² on Mar 6, 2019 (Wed) at 13:00 (GMT +8) to learn how to decode identity aware proxies.

    Presenter: Nick Hawkins, Senior Director, Product Management, Enterprise, Akamai Technologies
    Presenter: Aseem Ahmed, Senior Product Manager, Cloud Security, Akamai Technologies
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • (ISC)² Info Session: CISSP - The World's Premier Cybersecurity Certification Recorded: Feb 26 2019 64 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Accelerate your cybersecurity career with the CISSP certification.

    Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!

    During the online info-session, you will:
    - Gain an insight into the CISSP credential-its domains and career benefits for credential holders
    - Hear about the practical application of the CISSP related to real world issues for security professionals
    - Ask questions about the credential, exam and experience requirements
    - Learn everything you need to know about getting certified

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.

    https://www.isc2.org/cissp
  • (ISC)² Info Session: CSSLP-The Premier Secure Software Development Certification Recorded: Feb 22 2019 57 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue CCSLP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    www.isc2.org/csslp

    Are you ready to prove yourself? Register and begin your CSSLP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • Remediating Threats by Bridging Islands of Security Recorded: Feb 20 2019 63 mins
    Terence Grey, Senior Systems Engineer, ANZ, Infoblox
    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline to improve their cybersecurity operations?

    Join Infoblox and (ISC)² on Feb 20, 2019 (Wed) at 14:00 (GMT +8) to learn how to assist organisations in improving their security operations and reducing time to containment.

    Presenter: Terence Grey, Senior Systems Engineer, ANZ, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • (ISC)² Info Session: SSCP -The Premier Security Administrator Certification Recorded: Feb 19 2019 46 mins
    Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²
    Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets.

    In this info-session, you will learn:
    - How large is the cybersecurity workforce gap today
    - Why you should pursue SSCP
    - How to earn the certifications – exam and experience requirements
    - The recent updates on membership benefits and policies
    - And, ask any question that will support your certification journey

    Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

    =====================================================================
    SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to help you throughout your career.

    www.isc2.org/sscp

    Are you ready to prove yourself? Register and begin your SSCP journey today!

    NOTE: Join this info-session and earn 1 CPE.
  • How to Get the Most of Your (ISC)² Membership - Local Benefits and Global Reach Recorded: Feb 12 2019 55 mins
    Tony Vizza, CISSP , Director of Cyber Security Advocacy, APAC and Hazel Hung, Customer Services Manager, APAC
    As an (ISC)² Member, you now have access to a wide range of global resources, educational tools, peer networking opportunities, as well as exclusive discounts to industry events. There is so much more to discover to what your (ISC)² membership brings!

    In this webinar, you will learn about:
    - The latest news and developments across APAC and (ISC)² from around the world.
    - Exciting and upcoming CPE opportunities to help you stay sharp
    - Member benefits and perks including fantastic discounts on a range day to day items
    - New, upcoming and FREE professionally developed education courses just for members.
    - An update on (ISC)² certifications to help you take your career to the next level.
    - Networking opportunity with like-minded professionals locally and globally via ((ISC)² chapters
    - An opportunity to ask questions in our Q&A session

    Join us on Feb 12, 2019 (Tue) at 14:00 (GMT +8) to get the most of your (ISC)² membership globally and locally.
  • Reducing Vulnerability Overload is Key to Protecting Your Business Recorded: Jan 30 2019 64 mins
    Robert Healey, Senior Director Marketing, APAC, Tenable
    Today, every organization faces vulnerability overload. In 2018 alone, Tenable Research estimates nearly 19,000 new vulnerabilities will be disclosed. There are just too many to discover, assess and effectively mitigate.

    Reducing vulnerability overload means focusing like a laser on vulnerabilities most likely to impact your business right now. To learn how you can address this challenge, join Robert Healey, APAC Marketing Director with Tenable and (ISC)² at 14:00 (Singapore Time) on Jan 30, 2019 (Wed), for a webinar exploring best practices you can adopt to overcome vulnerability overload and better protect your business from cyber risk.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
Live Webinars for InfoSec Professionals in Asia Pacific Time Zone
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Phishing Awareness and Response: Can Technology Alone Make a Difference?
  • Live at: Sep 21 2016 6:00 am
  • Presented by: Jim Hansen, Chief Operating Officer, PhishMe
  • From:
Your email has been sent.
or close